User's Manual

Basic Service Set Identifier (BSSID) is the Ethernet MAC address of
each adapter on the network.
CA (Certificate
Authority)
A corporate certification authority implemented on a server. In
addition, Internet Explorer's certificate can import a certificate from
a file. A trusted CA certificate is stored in the root store.
CCX (Cisco
Compatible
eXtension)
Cisco Compatible Extensions Program ensures that devices used on
Cisco wireless LAN infrastructure meet the security, management
and roaming requirements.
Certificate
Used for client authentication. A certificate is registered on the
authentication server (for example, RADIUS server) and used by the
authenticator.
CKIP
Cisco Key Integrity Protocol (CKIP) is a Cisco proprietary security
protocol for encryption in 802.11 media. CKIP uses a key message
integrity check and message sequence number to improve 802.11
security in infrastructure mode. CKIP is Cisco's version of TKIP.
Client computer
The computer that gets its Internet connection by sharing either the
host computer's connection or the access point's connection.
DSSS
Direct Sequence Spread Spectrum. Technology used in radio
transmission. Incompatible with FHSS.
EAP
Short for Extensible Authentication Protocol, EAP sits inside of Point-
to-Point Protocol's (PPP) authentication protocol and provides a
generalized framework for several different authentication methods.
EAP is supposed to head off proprietary authentication systems and
let everything from passwords to challenge-response tokens and
public-key infrastructure certificates all work smoothly.
EAP-AKA
EAP-AKA (Extensible Authentication Protocol Method for UMTS
Authentication and Key Agreement) is an EAP mechanism for
authentication and session key distribution, using the Universal
Mobile Telecommunications System (UMTS) Subscriber Identity
Module (USIM). The USIM card is a special smart card used with
cellular networks to validate a given user with the network.
EAP-FAST
EAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic.
The main difference is that EAP-FAST does not use certificates to
authenticate.
Provisioning in EAP-FAST is negotiated solely by the client as the first
communication exchange when EAP-FAST is requested from the
server. If the client does not have a pre-shared secret Protected
Access Credential (PAC), it can request to initiate a provisioning EAP-
FAST exchange to dynamically obtain one from the server.
EAP-FAST documents two methods to deliver the PAC: manual
delivery through an out-of-band secure mechanism, and automatic
provisioning.
Manual delivery mechanisms can be any delivery mechanism
that the administrator of the network feels is sufficiently
secure for their network.